CSO

CSO Update

July 25, 2019

Image: Hunting vintage MS-DOS viruses from Cuba to Pakistan

Hunting vintage MS-DOS viruses from Cuba to Pakistan

Security researchers and enthusiasts try to understand and preserve the history of malware. Read more ▶

Your Must-Read Stories

How to set up Microsoft Azure AD Identity Protection to spot risky users

Equifax's data breach disaster: Will it change executive attitudes toward security?

31 hardware and firmware vulnerabilities: A guide to the threats

How to close SIEM visibility gaps created by legacy apps

The 6 best password managers

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

White Paper: Keysight Technologies

Get More from Your Monitoring Tools

Read our white paper, Get More from Your Performance Monitoring Tools, to learn how to boost monitoring efficiency. Get strategies for: • Managing increased traffic volume • Processing encrypted traffic • Accessing traffic in the cloud • Protecting quality at the network edge • Controlling operating costs Read more ▶

Image: How to set up Microsoft Azure AD Identity Protection to spot risky users

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior. Read more ▶

Image: There's finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There's finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Equifax's data breach disaster: Will it change executive attitudes toward security?

Equifax's data breach disaster: Will it change executive attitudes toward security?

Equifax's 2017 breach will cost it billions in fines, customer restitution and mandated and voluntary security improvements. All organizations that profit from consumer data should take notice. Read more ▶

 
 
Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

Image: How to close SIEM visibility gaps created by legacy apps

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility. Read more ▶

Image: The 6 best password managers

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read more ▶

Image: 4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone. Read more ▶

White Paper: Komprise

Wait! There's a Smarter Way… Grow your Data, Know your Data, Store your Data

Komprise and Cloudian offer a smarter way to manage today's exponential unstructured data growth. Komprise's analytics-driven data-management software enables you to quickly identify inactive data and easily move it to Cloudian HyperStore object storage. Komprise is fast and easy to install, with no storage agents or stubs to deal with. It works without creating performance degradation and can scale as needed to keep up with your data growth. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.